Skip to main content

A Semi-Automated Dynamic Approach to Threat Evaluation and Optimal Defensive Resource Allocation

  • Conference paper
Emerging Intelligent Computing Technology and Applications (ICIC 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5754))

Included in the following conference series:

Abstract

This paper presents a decision support based, dynamic approach to optimal threat evaluation and defensive resource scheduling. The algorithm provides flexibility and optimality by swapping between two objective functions, based on preferential and subtractive defense strategies, as and when required. Analysis part of this paper presents the strengths and weaknesses of the proposed algorithm over an alternative greedy algorithm as applied to different offline scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lloyd, S.P., Witsenhausen, H.S.: Weapons Allocation Is NP-complete. In: Proceedings of the 1986 summer computer simulation conference, pp. 1054–1058 (1986)

    Google Scholar 

  2. Ahuja, R.K., Kumar, A., Jha, K.C., Orlin, J.B.: Exact and Heuristic Methods for the Weapon Target Assignment Problem 55, 1136–1146 (2007)

    MATH  MathSciNet  Google Scholar 

  3. Hosein, P.A., Athans, M.: An Asymptotic Result for the Multi-stage Weapon Target Allocation Problem. In: Proceedings of the 29th IEEE Conference on Decision and Control, vol. 1, pp. 240–245 (1990)

    Google Scholar 

  4. Allouche, M.K.: A Pattern Recognition Approach to Threat Stabilization, tech. rep., DRDC Valcartier (2006)

    Google Scholar 

  5. Allouche, M.K.: Real-time Use of Kohonen’s Self-organizing Maps for Threat Stabilization. In: Proceedings of the 8th International Conference on Information Fusion, vol. 6, pp. 153–163 (2005)

    Google Scholar 

  6. Gregory, R.B., Palma, L.: Calif.: Knowledge Based Automatic Threat Evaluation and Weapon Assignment, US Patent no – 5992288 (1999)

    Google Scholar 

  7. Tin, G., Cutler, P.: Accomodating Obstacle Avoidance in the Weapon Allocation Problem for Tactical Air Defense. In: 9th International Conference on Information Fusion, pp. 1–8 (2006)

    Google Scholar 

  8. Borum, R., Fein, R., Vossekuil, B., Berglund, J.: Threat Assessment: Defining an Approach for Evaluating Risk of Targeted Violence. Behavioral Sciences and the Law 17, 323–405 (1999)

    Article  Google Scholar 

  9. Roux, R.N., Vuuren, J.H.: Threat Evaluation and Weapon Assignment Decision Support: A Review of the State of the Art. ORiON 23, 151–186 (2007)

    Google Scholar 

  10. Paradis, S., Benaskeur. A., Oxenham, M.G., Cutler, P.: Threat Evaluation and Weapon Allocation in Network-centric Warfare. In: Proceedings of the Seventh International Conference Fusion, “Usion 2004”, Stockholm (2005)

    Google Scholar 

  11. Pugh, G.E.: Lagrange Multipliers and the Optimal Allocation of Defense Resources. Operations Research 12, 543–567 (1964)

    Article  MATH  Google Scholar 

  12. Bellman, D., Gross, J.: On the Computational Solution of Dynamics Programming Processes: XIV: Missile Allocation Problems, RM 2282, RAND, Santa Monica California (1959)

    Google Scholar 

  13. Cohen, N.D.: An Attack-defense Game with Matrix Strategies, The Rand Corporation, Memorandum RM-4274-1-PR (1966)

    Google Scholar 

  14. Lee, Z.J., Lee, C.Y., Su, S.F.: An Immunity Based Ant Colony Optimization Algorithm for Solving Weapon-target Assignment. Applied Soft Computing 2, 39–47 (2002)

    Article  Google Scholar 

  15. Lee, Z.J., Su, S.F., Lee, C.Y.: A Genetic Algorithm with Domain Knowledge for Weapon-Target Assignment Problems. Journal of the Chinese Institute of Engineers 25(3), 287–295 (2002)

    Google Scholar 

  16. Johansson, F., Falkman, G.: A Bayesian Network Approach to Threat Evaluation with Application to an Air Defense Scenario. In: Proceedings of 11th International Conference on Information Fusion, vol. 10, pp. 1–7 (2008)

    Google Scholar 

  17. Deepak, S.H.: A Comparison of Agent based Optimization Approaches Applied to the Weapon to Targets Assignment Problem (2006)

    Google Scholar 

  18. Hossein, P.A., Athans, M.: Preferential Defense Strategies. Part 1: The Static Case (1990)

    Google Scholar 

  19. Berger, J., Leong, D.: The Resolution of an Open Loop Resource Allocation Problem using a Neural Network Approach. In: 27th Annual Simulation Symposium, pp. 51–58 (1994)

    Google Scholar 

  20. Hosein, P.A., Walton, J.T., Athans, M.: Dynamic Weapon Target Assignment Problem with Vulnerable C2 Nodes, by Massachusetts Inst. of Tech. Cambridge Lab for Information and Decision Systems (1988)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Naeem, H., Masood, A., Hussain, M., Khan, S.A. (2009). A Semi-Automated Dynamic Approach to Threat Evaluation and Optimal Defensive Resource Allocation. In: Huang, DS., Jo, KH., Lee, HH., Kang, HJ., Bevilacqua, V. (eds) Emerging Intelligent Computing Technology and Applications. ICIC 2009. Lecture Notes in Computer Science, vol 5754. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04070-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04070-2_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04069-6

  • Online ISBN: 978-3-642-04070-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics